Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 10:05

General

  • Target

    173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe

  • Size

    310KB

  • MD5

    173d0e92303587e1f3564b59eb463c25

  • SHA1

    e0816bebae695d3f988a4969c34fd6e06b3e9191

  • SHA256

    e1e6006649d476a243c058b0df39c29c2e464ee97fbedbdf531075cc6204b37d

  • SHA512

    023d95dc6ac09c7a1388f73499ae671f54566938c01a594b6a501dceec3395d925d8bc0761f3d280fb29cb1110214673fee7ccf98388a3d31a6e562a58a74c1c

  • SSDEEP

    6144:pmQXVDBkM4le0xNQD8ntXHilVuW+gA9x4O+BUjwgN6cexETrRd:0QFhYnN1nNH21+g+x4O+Bj065ErD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\173d0e92303587e1f3564b59eb463c25_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3336
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3956
  • C:\Windows\WINS.exe
    C:\Windows\WINS.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3964
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:4856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\WINS.exe

      Filesize

      310KB

      MD5

      173d0e92303587e1f3564b59eb463c25

      SHA1

      e0816bebae695d3f988a4969c34fd6e06b3e9191

      SHA256

      e1e6006649d476a243c058b0df39c29c2e464ee97fbedbdf531075cc6204b37d

      SHA512

      023d95dc6ac09c7a1388f73499ae671f54566938c01a594b6a501dceec3395d925d8bc0761f3d280fb29cb1110214673fee7ccf98388a3d31a6e562a58a74c1c

    • C:\Windows\uninstal.bat

      Filesize

      218B

      MD5

      082b364047dc8330a917799cd44b477e

      SHA1

      e0ef662f46391a05fe72c2be9ccfe99fd4801292

      SHA256

      26da2261e08d938df2488d37df5dc831c9ee1a2a31e68524e78ac15b9a229c68

      SHA512

      a2f3f5c4c3745deaa9e61c0059015cfdead062d1faa357eeafff3b1c492b2383a3d63ce8478e13b0e99cc10fa68c5b219d5066e5b4b19f6d1a31dc5610ed1f85

    • memory/3336-12-0x0000000000400000-0x0000000000518000-memory.dmp

      Filesize

      1.1MB

    • memory/3336-1-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

      Filesize

      4KB

    • memory/3336-2-0x0000000000400000-0x0000000000518000-memory.dmp

      Filesize

      1.1MB

    • memory/3336-3-0x0000000000B30000-0x0000000000B31000-memory.dmp

      Filesize

      4KB

    • memory/3336-0-0x0000000000400000-0x0000000000518000-memory.dmp

      Filesize

      1.1MB

    • memory/3964-9-0x00000000006C0000-0x00000000006C1000-memory.dmp

      Filesize

      4KB

    • memory/3964-8-0x0000000000400000-0x0000000000518000-memory.dmp

      Filesize

      1.1MB

    • memory/3964-14-0x0000000000400000-0x0000000000518000-memory.dmp

      Filesize

      1.1MB

    • memory/3964-15-0x00000000006A0000-0x00000000006A1000-memory.dmp

      Filesize

      4KB

    • memory/3964-17-0x00000000006C0000-0x00000000006C1000-memory.dmp

      Filesize

      4KB

    • memory/3964-21-0x0000000000400000-0x0000000000518000-memory.dmp

      Filesize

      1.1MB